Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving source code of an application, providing intermediate code based on the source code, the intermediate code including at least one instruction for profiling at least one line of the source code, providing profiling data by processing the intermediate code, processing the profiling data based on one or more of a latency model and an energy model to respectively provide at least one latency metric and at least one energy metric of the at least one line, and storing modified source code that is provided based on a modification of the at least one line of source code.

Patent
   10474557
Priority
Jul 19 2016
Filed
Jul 19 2016
Issued
Nov 12 2019
Expiry
Jul 19 2036
Assg.orig
Entity
Large
1
172
currently ok
1. A computer-implemented method executed by one or more processors, the method comprising:
receiving, by one or more processors, source code of an application;
processing, by an llvm pass of a compiler, the source code to provide intermediate code, the intermediate code comprising at least one instruction for profiling at least one line of the source code;
executing, by a compile-time instrumentation framework, the intermediate code to generate profiling data;
processing, by the one or more processors, the profiling data based on one or more of a latency model and an energy model to respectively provide at least one latency metric and at least one energy metric of the at least one line, the at least one latency metric of the at least one line indicating a time incurred by access to a memory during execution of the at least one line relative to a total execution time of the source code and the at least one energy metric of the at least one line indicating an energy consumption of the at least one line relative to a total energy time of the source code; and
storing, by the one or more processors, a modified source code that is provided based on a modification of the at least one line of source code to improve execution performance of the source code and to save energy by minimizing a memory access, the modification of the at least one line of source code being associated to a second latency metric and a second energy metric of the at least one line, the second latency metric indicating a shorter time to access the memory than the at least one latency metric and the second energy metric indicating a smaller energy consumption than the at least one energy metric.
8. A non-transitory computer-readable storage medium coupled to one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
receiving source code of an application;
processing, by an llvm pass of a compiler, the source code to provide intermediate code, the intermediate code comprising at least one instruction for profiling at least one line of the source code;
executing, by a compile-time instrumentation framework, the intermediate code to generate profiling data;
processing the profiling data based on one or more of a latency model and an energy model to respectively provide at least one latency metric and at least one energy metric of the at least one line, the at least one latency metric of the at least one line indicating a time incurred by access to a memory during execution of the at least one line relative to a total execution time of the source code and the at least one energy metric of the at least one line indicating an energy consumption of the at least one line relative to a total energy time of the source code; and
storing a modified source code that is provided based on a modification of the at least one line of source code to improve execution performance of the source code and to save energy by minimizing a memory access, the modification of the at least one line of source code being associated to a second latency metric and a second energy metric of the at least one line, the second latency metric indicating a shorter time to access the memory than the at least one latency metric and the second energy metric indicating a smaller energy consumption than the at least one energy metric.
15. A system, comprising:
a computing device; and
a computer-readable storage device coupled to the computing device and having instructions stored thereon which, when executed by the computing device, cause the computing device to perform operations comprising:
receiving source code of an application;
processing, by an llvm pass of a compiler, the source code to provide intermediate code, the intermediate code comprising at least one instruction for profiling at least one line of the source code;
executing, by a compile-time instrumentation framework, the intermediate code to generate profiling data;
processing the profiling data based on one or more of a latency model and an energy model to respectively provide at least one latency metric and at least one energy metric of the at least one line, the at least one latency metric of the at least one line indicating a time incurred by access to a memory during execution of the at least one line relative to a total execution time of the source code and the at least one energy metric of the at least one line indicating an energy consumption of the at least one line relative to a total energy time of the source code; and
storing a modified source code that is provided based on a modification of the at least one line of source code to improve execution performance of the source code and to save energy by minimizing a memory access, the modification of the at least one line of source code being associated to a second latency metric and a second energy metric of the at least one line, the second latency metric indicating a shorter time to access the memory than the at least one latency metric and the second energy metric indicating a smaller energy consumption than the at least one energy metric.
2. The method of claim 1, wherein the at least one instruction is provided based on at least one annotation included in the source code, the at least one annotation annotating the at least one line and indicating that the at least one line is to be profiled.
3. The method of claim 1, wherein the at least one annotation comprises an annotation immediately preceding the at least one line, and an annotation immediately following the at least one line.
4. The method of claim 1, wherein the latency metric indicates a latency in accessing memory based on execution of the at least one line.
5. The method of claim 1, wherein the energy metric indicates an energy consumed in accessing memory based on execution of the at least one line.
6. The method of claim 1, wherein the profiling data is provided based on a cache simulator.
7. The method of claim 1, wherein the modification of the at least one line of source code improves at least one of the at least one latency metric and at least one energy metric.
9. The computer-readable storage medium of claim 8, wherein the at least one instruction is provided based on at least one annotation included in the source code, the at least one annotation annotating the at least one line and indicating that the at least one line is to be profiled.
10. The computer-readable storage medium of claim 8, wherein the at least one annotation comprises an annotation immediately preceding the at least one line, and an annotation immediately following the at least one line.
11. The computer-readable storage medium of claim 8, wherein the latency metric indicates a latency in accessing memory based on execution of the at least one line.
12. The computer-readable storage medium of claim 8, wherein the energy metric indicates an energy consumed in accessing memory based on execution of the at least one line.
13. The computer-readable storage medium of claim 8, wherein the profiling data is provided based on a cache simulator.
14. The computer-readable storage medium of claim 8, wherein the modification of the at least one line of source code improves at least one of the at least one latency metric and at least one energy metric.
16. The system of claim 15, wherein the at least one instruction is provided based on at least one annotation included in the source code, the at least one annotation annotating the at least one line and indicating that the at least one line is to be profiled.
17. The system of claim 15, wherein the at least one annotation comprises an annotation immediately preceding the at least one line, and an annotation immediately following the at least one line.
18. The system of claim 15, wherein the latency metric indicates a latency in accessing memory based on execution of the at least one line.
19. The system of claim 15, wherein the energy metric indicates an energy consumed in accessing memory based on execution of the at least one line.
20. The system of claim 15, wherein the profiling data is provided based on a cache simulator.

A business or other type of enterprise may operate enterprise systems to provide software functionality to customers and employees. An enterprise system may include back-end enterprise servers that host enterprise applications such as enterprise resource planning (ERP) systems, client-relationship management (CRM) systems, product lifecycle management (PLM) systems, supply chain management (SCM) systems, supplier relationship management (SRM) systems, and so forth. During the execution of an enterprise application, application data may be placed in or accessed from the main memory of the enterprise server, such that the application data is immediately accessible by processors of the enterprise server.

Increasingly, large amounts of application data are stored in the main memory of enterprise servers. Main memory may include dynamic random access memory (DRAM), which consumes a relatively high amount of static energy both in active and idle states due to continuous leakage and refresh power. Various byte-addressable non-volatile memory (NVM) technologies promise near-zero static energy and persistence. However, NVM may exhibit high latency and high dynamic energy relative to DRAM.

Implementations of the present disclosure include computer-implemented methods for providing line-level profile data for source code. In some implementations, methods include actions of receiving source code of an application, providing intermediate code based on the source code, the intermediate code including at least one instruction for profiling at least one line of the source code, providing profiling data by processing the intermediate code, processing the profiling data based on one or more of a latency model and an energy model to respectively provide at least one latency metric and at least one energy metric of the at least one line, and storing modified source code that is provided based on a modification of the at least one line of source code.

These and other implementations may each optionally include one or more of the following features: the at least one instruction is provided based on at least one annotation included in the source code, the at least one annotation annotating the at least one line and indicating that the at least one line is to be profiled; the at least one annotation includes an annotation immediately preceding the at least one line, and an annotation immediately following the at least one line; the latency metric indicates a latency in accessing memory based on execution of the at least one line; the energy metric indicates an energy consumed in accessing memory based on execution of the at least one line; the profiling data is provided based on a cache simulator; and the modification of the at least one line of source code improves at least one of the at least one latency metric and at least one energy metric.

The present disclosure also provides one or more non-transitory computer-readable storage media coupled to one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations in accordance with implementations of the methods provided herein.

The present disclosure further provides a system for implementing the methods provided herein. The system includes one or more processors, and a computer-readable storage medium coupled to the one or more processors having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations in accordance with implementations of the methods provided herein.

It is appreciated that methods in accordance with the present disclosure may include any combination of the aspects and features described herein. That is, methods in accordance with the present disclosure are not limited to the combinations of aspects and features specifically described herein, but also include any combination of the aspects and features provided.

The details of one or more implementations of the present disclosure are set forth in the accompanying drawings and the description below. Other features and advantages of the present disclosure will be apparent from the description and drawings, and from the claims.

FIG. 1 depicts a diagram of an example methodology in accordance with implementations of the present disclosure.

FIG. 2 depicts an example architecture to line-level profile data in accordance with implementations of the present disclosure.

FIG. 3 depicts an example process that can be executed in accordance with implementations of the present disclosure.

Like reference symbols in the various drawings indicate like elements.

Implementations of the present disclosure are generally directed to a computer-executable tool to conduct analyses on application source code. More particularly, implementations of the present disclosure enable line-level instrumentation of source code to measure latency and energy consumed through execution. In some implementations, the computer-implemented tool of the present disclosure enables an application programmer developer to annotate any line in the source code, the annotations being used for latency and energy measurement of respective lines during execution of the application. In this manner, applications can be optimized by pin-pointing problematic (in terms of latency and/or energy consumption) lines of source code. These lines of source code lines embody any type of functionality (e.g., function calls, memory allocations).

To provide context for implementations of the present disclosure, real-time data analytics aim at making knowledge available with sub-second and often sub-millisecond response time. For example, real-time enterprise resource planning (ERP) systems enable enterprises to view every change in the enterprise as soon as it happens, and can be a driver in the success of the enterprise. In some examples, real-time access to information helps in gaining competitive advantage through efficient and improved (e.g., more informed) decision making, product pricing, risk management, product life-cycle, customer feedback, customer engagement, brand development, product pricing, and reduced total cost of ownership (TCO). The growing volumes of enterprise data makes it challenging to achieve the target response times in real-time data analytics.

The advances in multi-core processing, caching and less expensive main memory has brought a major breakthrough in designing real-time enterprise systems. In-memory databases open doors for real-time analytics as it uses faster main-memory as a primary storage, and bypasses I/O disk delays in analytical data processing. Improvements in both hardware and in-memory databases have triggered the unification of both operational and analytical storage models together in a unified in-memory data store. For example, slower, disk-based memory is only required for persistent storage. This has a negligible impact on the throughput of in-memory databases, because persistence is moved from the critical path. Accordingly, in-memory databases enable real-time data analytics on unified data with minimal response times, because the data resides in main memory, which is an order of magnitude faster for accessing than traditional, disk-based memory.

Applications, such as real-time ERP application, are increasing in complexity, and the source code lines of applications are continuously growing. In order to optimize applications for latency or energy, in-depth analyses of the source code can be performed to identify lines of code that are bottlenecks in terms of latency and energy. However, tools used to perform such analyses can be inaccurate and inefficient.

In view of the above context, and as described in further detail herein, implementations of the present disclosure are generally directed to a computer-executable tool to conduct analyses on application source code. More particularly, implementations of the present disclosure enable line-level instrumentation of source code to measure latency and energy consumed through execution. In some implementations, the computer-implemented tool of the present disclosure enables an application programmer developer to annotate any line in the source code, the annotations being used for latency and energy measurement of respective lines during execution of the application. In this manner, applications can be optimized by pin-pointing problematic (in terms of latency and/or energy consumption) lines of source code. These lines of source code lines embody any type of functionality (e.g., function calls, memory allocations).

FIG. 1 depicts a diagram 100 of an example methodology in accordance with implementations of the present disclosure. The example diagram 100 includes source code 102, a profiling tool 104, a compiler 106, an instrumented executable 108, an execution environment 110, data profiles 112, and latency model and/or energy model 114. In some examples, the source code 102 is provided as human-readable code that underlies an application that is to be profiled. In some examples, the profiling tool 104 includes annotations that can be added to individual lines to the source code to provide data regarding energy and/or latency for respective lines. The source code 102 can be annotated, as described herein, and is provided to the compiler 106, which compiles the annotated source code into the instrumented executable 108. In some examples, the instrumented executable 108 is provided as one or more computer-executable files that can be executed by one or more computing devices. The instrumented executable 108 is executed in the execution environment 110 to provide the profile data 112. The latency model and/or energy model 114 can be applied to the profile data 112 to provide latency and/or energy measurements for individual lines of the source code.

In accordance with implementations of the present disclosure, and as described in further detail herein, a tool library is used to profile individual lines of source code, and provide profile data (e.g., the profile data 112 of FIG. 1). In one examples, the source code underlies an application that is used to provide an in-memory database, and includes N lines of source code. If the developer can determine, which of the N lines of the source code consume the most access time (latency) and/or the energy, the developer, or a computer-executable compiler can optimize those lines in order to improve the performance of the application on the underlying hardware.

In some implementations, an application program interface (API) is provided, and is inserted into the source code for each line that is to be profiled. In some examples, the API includes a plurality of functions that can be used to apply annotations to the source for the beginning and end of a line that is to be profiled. Example functions can include a start profiling function (e.g., startProfiling (LINE NUMBER, START TIME)), and an end profiling function (e.g., endProfiling (LINE NUMBER, END TIME)). For example, if a particular line of source code is to be profiled, the start profiling function is inserted immediately before the line, and the end profiling function is inserted immediately following the line.

FIG. 2 depicts an example architecture 200 to provide line-level profile data in accordance with implementations of the present disclosure. In the depicted example, the example architecture 200 includes a pass 202 (e.g., an LLVM pass), and a compile-time instrumentation framework 204. In some examples, the pass 202 receives application source code 206 (e.g., source code of the application, one or more lines of which are to be individually profiled), and provides executable code (e.g., the instrumented executable 108 of FIG. 1). In some examples, the pass 202 compiles the source code and adds instrumentation code to provide the executable code. In some examples, the instrumentation code includes instructions to profile one or more lines of the application during execution.

In some examples, the executable code 208 is provided as bit-code (e.g., machine-readable code) and is executed by the compile-time instrumentation framework 204 to provide a profiling data 210, as described in further detail herein. In some examples, the profiling data 210 provides, for each line that is to be profiled, memory access data.

In accordance with implementations of the present disclosure, the profiling library creates a node in SPLAY tree for each of the line markers that the programmer has added into the source code. In some examples, a SPLY tree is a self-adjusting binary search tree that enables recently accessed elements to be relatively quickly re-accessed. In some implementations, the profiling library profiles all of the data objects that are created during execution of the lines that are to be profiled. In some examples, the profiling tool stores all of the loads and stores issued by the profiled lines, as well as all of the read/write memory traffic that is serviced from the main memory (e.g., DRAM).

For each line that is to be profiled, implementations of the present disclosure estimate the latency and energy consumption. In some examples, the latency and energy consumption are determined relative to the total execution time of the application, and the total energy consumed by the application, respectively. Implementations of the present disclosure provide a latency model and an energy model that can be executed to analyze the source code at the granularity of lines.

In some implementations, the latency T of a line l is provided as the time incurred by accesses to memory (e.g., DRAM) during execution of the line l, and can be determined based on the following example relationship:

T ( l ) = μ r ( l ) L DRAM , r + μ w ( l ) L DRAM , w + ( 1 - μ r ( l ) ) L LLC + ( 1 - μ w ( l ) ) L LLC ( 1 )
where LDRAM,r is the latency to read a cache block in memory, LDRAM,w is the latency to write a cache block in memory, LLLC is the latency to access the last level cache (LLC), μr(l) is the number of read memory accesses made during execution of the line l, and μw(l) is the number of write memory accesses made during execution of the line l.

In some implementations, the energy E of a line l is provided as the energy consumed by accesses to memory (e.g., DRAM) during execution of the line l, and can be determined based on the following example relationship:
E(l)=μr(l)EDRAM,r−μw(l)EDRAM,w+τS(l)PDRAMT(l)  (2)
where EDRAM,r and EDRAM,w are the energy for reading and writing, respectively, to or from DRAM, PDRAM is the average leakage power per byte for DRAM, and the parameters S(l) and T(l) represent the size and lifetime, respectively, of object(s) accessed during execution of the line l.

Implementations of the present disclosure further provide an energy-delay (ED) for each line l. In some examples, ED combines the latency and the energy into a single metric, and can be determined based on the following example relationship:

ED ( l ) = ( μ r ( l ) E DRAM , r + μ w ( l ) E DRAM , w + μ w ( l ) L DRAM , w + ( 1 - μ r ( l ) ) E LLC + ( 1 - μ w ( l ) ) E LLC ) × ( μ r ( l ) L DRAM , r + μ w ( l ) L DRAM , w + μ w ( l ) L DRAM , w + ( 1 - μ r ( l ) ) L LLC + ( 1 - μ w ( l ) ) L LLC ) ( 3 )
where ELLC is the energy consumed to access the LLC. In some examples, the ED for a particular line of code represents how much energy is consumed when the application executes that particular line of code and how much CPU cycles were consumed. Both of these metrics identify the correlation between the energy consumed as compared to the CPU cycles required to execute the particular line of code. For example, in reducing energy consumption, the ED indicates whether the reduction in energy comes at the cost of performance degradation.

In some implementations, the original source code, for which profile data is provided, can be modified to improve performance in terms of latency and/or energy consumptions. For example, a line of the source code can be changed to achieve the required functionality, but at a lower cost in terms of latency and/or energy. As one example, if a line of code is making random accesses over an array data structure, the line of code can be improved by modifying the line of code to make sequential access traversal. In this manner, most of accesses to the array data structure should be served from the processor caches L1, L2 or L3. If most of the memory accesses are served from the caches, the locality of accesses for that particular line of code, as modified, has been improved. As a result, there will be fewer accesses to main memory like DRAM, which not only improves the performance (e.g., less CPU cycles consumed), but also saves energy (by less accesses to DRAM or NVM).

FIG. 3 depicts an example process 300 that can be executed in accordance with implementations of the present disclosure. In some implementations, the example process 300 may be performed using one or more computer-executable programs executed using one or more computing devices.

Source code of an application is received (302). For example, the profiling tool can receive the source code of the application. Intermediate code is provided based on the source code (304). For example, a pass (e.g., LLVM pass) of the profiling tool can provide the intermediate code based on the source code, as described herein. In some examples, the intermediate code includes at least one instruction for profiling at least one line of the source code. Profiling data is provided (306). For example, the profiling tool processes the intermediate code based on simulated memory accesses, as described herein. The profiling data is processed to provide one or more metrics (308). For example, the profiling data is processed based on latency and/or energy models to provide respective latency and/or energy metrics for respective lines of the source code, as described herein. Modified source code is stored (310). For example, the modified source code is provided based on a modification of the at least one line of source code.

The features described may be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. The apparatus may be implemented in a computer program product tangibly embodied in an information carrier (e.g., in a machine-readable storage device) for execution by a programmable processor; and method steps may be performed by a programmable processor executing a program of instructions to perform functions of the described implementations by operating on input data and generating output. The described features may be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. A computer program is a set of instructions that may be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result. A computer program may be written in any form of programming language, including compiled or interpreted languages, and it may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.

Suitable processors for the execution of a program of instructions include, by way of example, both general and special purpose microprocessors, and the sole processor or one of multiple processors of any kind of computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. Elements of a computer may include a processor for executing instructions and one or more memories for storing instructions and data. Generally, a computer may also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory may be supplemented by, or incorporated in, application-specific integrated circuits (ASICs).

To provide for interaction with a user, the features may be implemented on a computer having a display device such as a cathode ray tube (CRT) or liquid crystal display (LCD) monitor for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user may provide input to the computer.

The features may be implemented in a computer system that includes a back-end component, such as a data server, or that includes a middleware component, such as an application server or an Internet server, or that includes a front-end component, such as a client computer having a graphical user interface or an Internet browser, or any combination of them. The components of the system may be connected by any form or medium of digital data communication such as a communication network. Examples of communication networks include, e.g., a local area network (LAN), a wide area network (WAN), and the computers and networks forming the Internet.

The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a network, such as the described one. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.

In addition, the logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. In addition, other steps may be provided, or steps may be eliminated, from the described flows, and other components may be added to, or removed from, the described systems. Accordingly, other implementations are within the scope of the following claims.

A number of implementations of the present disclosure have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the present disclosure. Accordingly, other implementations are within the scope of the following claims.

Hassan, Ahmad

Patent Priority Assignee Title
11636313, Dec 03 2019 SAP SE Recommendation system based on neural network models to improve efficiencies in interacting with e-commerce platforms
Patent Priority Assignee Title
10083183, Jul 19 2016 SAP SE Full system simulator and memory-aware splay tree for in-memory databases in hybrid memory systems
5845325, Oct 02 1987 Sun Microsystems, Inc. Virtual address write back cache with address reassignment and cache block flush
6157955, Jun 15 1998 Intel Corporation Packet processing system including a policy engine having a classification unit
6195731, May 26 1997 Bull, S.A. Instrumentation device for a machine with non-uniform memory access
6760721, Apr 14 2000 Intel Corporation System and method of managing metadata data
6952664, Apr 13 2001 Oracle International Corporation System and method for predicting cache performance
7181578, Sep 12 2002 RPX Corporation Method and apparatus for efficient scalable storage management
7360073, May 15 2003 PointSec Mobile Technologies, LLC; Protect Data AB Method and apparatus for providing a secure boot for a computer system
7434002, Apr 24 2006 VMWARE, INC Utilizing cache information to manage memory access and cache utilization
7624381, Oct 19 2004 Oracle America, Inc Portable detection of start and completion of object construction
7774556, Nov 04 2006 Western Digital Technologies, INC Asymmetric memory migration in hybrid main memory
7840397, Dec 02 2005 Simulation method
7958329, Oct 09 2006 Waratek Pty Ltd Hybrid replicated shared memory
8170859, Apr 28 2006 Intel Corporation Methods, apparatuses and computer program products for simulating arbitrary unmodified code
8185471, Sep 23 2008 Bank of America Corporation Integrated payment receiving and processing system
8214191, Aug 29 2005 The Invention Science Fund I, LLC Cross-architecture execution optimization
8230395, Sep 20 2004 The MathWorks, Inc. Memory mapping for single and multi-processing implementations of code generated from a block diagram model
8456905, Dec 16 2007 Apple Inc Efficient data storage in multi-plane memory devices
8572051, Aug 08 2012 Oracle International Corporation Making parallel execution of structured query language statements fault-tolerant
8862588, Nov 30 2011 GOOGLE LLC Generating an empirically-determined schema for a schemaless database
8868537, Nov 11 2013 WELLS FARGO BANK, N A Simple web search
8874846, Jun 01 2011 International Business Machines Corporation Memory cell presetting for improved memory performance
8880687, Feb 06 2012 NetApp, Inc. Detecting and managing idle virtual storage servers
8959611, Sep 09 2009 Amazon Technologies, Inc.; Amazon Technologies, Inc Secure packet management for bare metal access
8966462, Aug 10 2012 Microsoft Technology Licensing, LLC Memory management parameters derived from system modeling
9043530, Apr 09 2012 NetApp, Inc. Data storage within hybrid storage aggregate
9304913, Mar 15 2013 Qualcomm Incorporated Mixed memory type hybrid cache
9348539, Mar 12 2013 Rambus Inc Memory centric computing
9626327, Jun 11 2009 U S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT Memory device for a hierarchical memory architecture
9652380, Dec 19 2014 SK Hynix Inc. Data processing system and operating method thereof
9672158, Nov 04 2006 Western Digital Technologies, INC Asymmetric memory migration in hybrid main memory
9712538, Sep 09 2009 Amazon Technologies, Inc. Secure packet management for bare metal access
9720925, Apr 12 2012 ORCHARD VALLEY MANAGEMENT LLC Software similarity searching
9720967, Sep 28 2012 Oracle International Corporation Adaptive query optimization
9740438, Aug 20 2015 SAP SE Allocating memory on multiple types of main memory technologies from software application layer
9841914, May 05 2015 SAP SE Managed energy-efficient hybrid main memory systems
9846550, Jan 28 2010 Hewlett Packard Enterprise Development LP; University of Utah Memory access methods and apparatus
20010027387,
20030033431,
20030065648,
20040184340,
20050097078,
20050108447,
20060059474,
20060117299,
20070050328,
20070050609,
20070202473,
20070226186,
20080005476,
20080034179,
20080109592,
20080140682,
20080288718,
20080288742,
20090049234,
20090157952,
20090157964,
20090182976,
20090307462,
20100010799,
20100042999,
20100153631,
20100169602,
20100262633,
20100287356,
20100306591,
20100318718,
20110066808,
20110072006,
20110078340,
20110093654,
20110131199,
20110271264,
20110313999,
20120072744,
20120089595,
20120124318,
20120144092,
20120151127,
20120151252,
20120158799,
20120246392,
20120290768,
20130013860,
20130074092,
20130080621,
20130081005,
20130086309,
20130103380,
20130226903,
20130246698,
20130275716,
20130283250,
20130326109,
20140007043,
20140089564,
20140108723,
20140188870,
20140280685,
20140281212,
20140281249,
20140282455,
20140293801,
20150012465,
20150062736,
20150077426,
20150081300,
20150089604,
20150106582,
20150169226,
20150199126,
20150206574,
20150309789,
20150363319,
20150370560,
20150378169,
20160005423,
20160019132,
20160117241,
20160117258,
20160125927,
20160150003,
20160179685,
20160188217,
20160196112,
20160196324,
20160205174,
20160253093,
20160321048,
20160328169,
20160336069,
20160378169,
20160378829,
20160378977,
20170010817,
20170052741,
20170052742,
20170060740,
20170090776,
20170091334,
20170115892,
20170116210,
20170147516,
20170154136,
20170160955,
20170161198,
20170193136,
20170206010,
20170206172,
20170212843,
20170220256,
20170220257,
20170220488,
20170220516,
20170223046,
20170242595,
20170289000,
20170301386,
20170352012,
20180024750,
20180024754,
20180024755,
20180024821,
20180024922,
20180024923,
20180024928,
20180024997,
20180025016,
20180025055,
20180025904,
20190057131,
//
Executed onAssignorAssigneeConveyanceFrameReelDoc
Jul 18 2016HASSAN, AHMAD SAP SEASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0391920579 pdf
Jul 19 2016SAP SE(assignment on the face of the patent)
Date Maintenance Fee Events
May 03 2023M1551: Payment of Maintenance Fee, 4th Year, Large Entity.


Date Maintenance Schedule
Nov 12 20224 years fee payment window open
May 12 20236 months grace period start (w surcharge)
Nov 12 2023patent expiry (for year 4)
Nov 12 20252 years to revive unintentionally abandoned end. (for year 4)
Nov 12 20268 years fee payment window open
May 12 20276 months grace period start (w surcharge)
Nov 12 2027patent expiry (for year 8)
Nov 12 20292 years to revive unintentionally abandoned end. (for year 8)
Nov 12 203012 years fee payment window open
May 12 20316 months grace period start (w surcharge)
Nov 12 2031patent expiry (for year 12)
Nov 12 20332 years to revive unintentionally abandoned end. (for year 12)